Conference Program

Day1 (Monday, September 15)
12:10-16:30 Registration Check-in
18:30-20:30Welcome Reception

Day2 (Tuesday, September 16)
09:00-09:15Opening Ceremony
Keynote Speech I
Chair: Prof. Shiuhpyng Shieh, National Chiao Tung University, Taiwan
Speaker: Prof. Doug Tygar, UC Berkeley, U.S.A
"Defending Machine Learning"
10:05-10:30Coffee Break
Session 1: Trusted Computing
Session Chair: Prof. D. J. Guan, National Sun Yat-Sen University, Taiwan
  1. Property-Based TPM Virtualization, Ahmad-Reza Sadeghi (Ruhr-University Bochum, DE), Christian Stueble (Sirrix AG security technologies, DE), and Marcel Winandy (Ruhr-University Bochum, DE)
  2. A Demonstrative Ad-hoc Attestation System, Endre Bangerter (Bern University of Applied Sciences, CH), Maksim Djackov (Bern University of Applied Sciences, CH), and Ahmad-Reza Sadeghi (Ruhr-University Bochum, DE)
  3. Property-Based Attestation without a Trusted Third Party, Liqun Chen (HP Laboratories, Bristol, UK), Hans Löhr (Ruhr-University Bochum, DE), Mark Manulis (Université Catholique de Louvain, BE), and Ahmad-Reza Sadeghi (Ruhr-University Bochum, DE)
  4. Certificate Based Signature Schemes without Pairings or Random Oracles, Joseph K. Liu (Institute for Infocomm Research, SG), Joonsang Baek (Institute for Infocomm Research, SG), Willy Susilo (University of Wollongong, AU), and Jianying Zhou (Institute for Infocomm Research, SG)
Session 2: Database and System Security
Session Chair: Prof. Endre Bangerter, Bern University of Applied Sciences, Switzerland
  1. An Efficient PIR Construction Using Trusted Hardware, Yanjiang Yang (Singapore Management University, SG), Xuhua Ding (Singapore Management University, SG), Robert H. Deng (Singapore Management University, SG), and Feng Bao (Institute for Infocomm Research, SG)
  2. Athos: Efficient Authentication of Outsourced File Systems, Michael T. Goodrich (University of California, Irvine, US), Charalampos Papamanthou (Brown University, US), Roberto Tamassia (Brown University, US), and Nikos Triandopoulos (University of Aarhus, DK)
  3. BotTracer: Execution-based Bot-like Malware Detection, Lei Liu (George Mason University, US), Songqing Chen (George Mason University, US), Guanhua Yan (Los Alamos National Lab, US), and Zhao Zhang (Iowa State University, US)
Session 3: Intrusion Detection
Session Chair: Prof. Chun-I Fan, National Sun Yat-Sen University, Taiwan
  1. Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets, Ryan Iwahashi (University of California at Davis, US), Daniela A. S. de Oliveira (University of California at Davis, US), S. Felix Wu (University of California at Davis, US); Jedidiah R. Crandall (University of New Mexico, US); Young-Jun Heo (ETRI, KR); Jin-Tae Oh (ETRI, KR); Jong-Soo Jang (ETRI, KR)
  2. Distinguishing between FE and DDoS using Randomness Check, Hyundo Park (Korea University, KR), Peng Li (Singapore Management University, SG), Debin Gao (Singapore Management University, SG), Heejo Lee (Korea University, KR), and Robert H Deng (Singapore Management University, SG)
15:35-16:00Coffee Break
Session 4: Network Security
Session Chair: Prof. Debin Gao, Singapore Management University, Singapore
  1. Antisocial Networks: Turning a Social Network into a Botnet, E. Athanasopoulos (Institute of Computer Science, FORTH, GR), A. Makridakis (Institute of Computer Science, FORTH, GR), S. Antonatos (Institute of Computer Science, FORTH, GR), D. Antoniades (Institute of Computer Science, FORTH, GR), S. Ioannidis (Institute of Computer Science, FORTH, GR), K. G. Anagnostakis (Institute for Infocomm Research, SG) and E. P. Markatos (Institute of Computer Science, FORTH, GR)
  2. Compromising Anonymity Using Packet Spinning, Vasilis Pappas (Institute of Computer Science, FORTH, GR), Elias Athanasopoulos (Institute of Computer Science, FORTH, GR), Sotiris Ioannidis (Institute of Computer Science, FORTH, GR), and Evangelos P. (Institute of Computer Science, FORTH, GR)
  3. Behavior-Based Network Access Control: A Proof-of-Concept, Vanessa Frias-Martinez (Columbia University, US), Salvatore J. Stolfo (Columbia University, US), and Angelos D. Keromytis (Columbia University, US)
  4. Path-based Access Control for Enterprise Networks, Matthew Burnside (Columbia University, US) and Angelos D. Keromytis (Columbia University, US)

Day3 (Wednesday, September 17)
Keynote Speech II
Chair: Prof. Chung-Huang Yang, National Kaohsiung Normal University, Taiwan
Speaker: Dr. Tatsuaki Okamoto, NTT, Japan
"Encryption and Signatures from Vector Decomposition Problems"
10:05-10:30Coffee Break
Session 5: Cryptanalysis
Session Chair: Dr. Cormac Herley, Microsoft Research, United States
  1. Cryptanalysis of Rabbit, Yi Lu (Nanyang Technological University, SG), Huaxiong Wang (Nanyang Technological University, SG), and San Ling (Nanyang Technological University, SG)
  2. Algebraic Attack on HFE Revisited, Jintai Ding (University of Cincinnati, US), Dieter Schmidt (University of Cincinnati, US), and Fabian Werner (Technical University of Darmstadt, DE)
  3. Revisiting Wiener's Attack -- New Weak Keys in RSA, Subhhamoy Maitra (Indian Statistical Institute, IN) and Santanu Sarkar (Indian Statistical Institute, IN)
  4. Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family, Somitra Kumar Sanadhya (Indian Statistical Institute, IN) and Palash Sarkar (Indian Statistical Institute, IN)
13:30-17:40National Palace Museum Tour
18:30-20:30Gala Banquet

Day4 (Thursday, September 18)
Session 6: Digital Signatures
Session Chair: Prof. Huaxiong Wang, Nanyang Technological University, Singapore
  1. Proxy Re-Signatures in the Standard Model, Sherman S.M. Chow (New York University, US) and Raphael C.-W. Phan (Loughborough University, UK)
  2. An RSA-based (t,n) Threshold Proxy Signature Scheme without any Trusted Combiner, Pei-yih Ting (National Taiwan Ocean University, TW) and Xiao-Wei Huang (Academia Sinica, TW)
  3. The Reduced Address Space (RAS) for Application Memory Authentication, David Champagne (Princeton University, US), Reouven Elbaz (Princeton University, US), and Ruby B. Lee (Princeton University, US)
10:15-10:30Coffee Break
Session 7: AES Special Session
Session Chair: Prof. Vincent Rijmen, Graz University of Technology, Austria
  1. Improved Impossible Differential Attacks on Large-Block Rijndael, Lei Zhang (Chinese Academy of Sciences, CN), Wenling Wu (Chinese Academy of Sciences, CN), Je Hong Park (Electronics and Telecommunications Research Institute, KR), Bon Wook Koo (Electronics and Telecommunications Research Institute, KR), and Yongjin Yeom (Electronics and Telecommunications Research Institute, KR)
  2. A five-round algebraic property of the Advanced Encryption Standard, Jianyong Huang (University of Wollongong, AU), Jennifer Seberry (University of Wollongong, AU), and Willy Susilo (University of Wollongong, AU)
  3. Vortex: A New Family of One-way Hash Functions Based on AES Rounds and Carry-less Multiplication, Shay Gueron (University of Haifa, IL and Intel Corporation, IL) and Michael E. Kounavis (Intel Corporation, US)
  4. Comparative Evaluation of Rank Correlation based DPA on an AES Prototype Chip, Lejla Batina (K.U. Leuven, ESAT/SCD-COSIC and IBBT, BE), Benedikt Gierlichs (K.U. Leuven, ESAT/SCD-COSIC and IBBT, BE), and Kerstin Lemke-Rust (T-Systems GEI GmbH, DE)
Session 8: Symmetric Cryptography and Hash Functions
Session Chair: Prof. Chien-Lung Hsu, Chang Gung University, Taiwan
  1. Collisions for RC4-Hash, Sebastiaan Indesteege (Katholieke Universiteit and IBBT, BE) and Bart Preneel (Katholieke Universiteit and IBBT, BE)
  2. New Applications of Differential Bounds of the SDS Structure, Jiali Choy (DSO National Laboratories, SG) and Khoongming Khoo (DSO National Laboratories, SG)
Session 9: Authentication
Session Chair: Prof. Chih-Hung Wang, National Chiayi University, Taiwan
  1. HAPADEP: Human-Assisted Pure Audio Device Pairing, Claudio Soriente (University of California, Irvine, US), Gene Tsudik (University of California, Irvine, US), and Ersin Uzun (University of California, Irvine, US)
  2. One-Time Password Access without Changing the Server, Dinei Florêncio (Microsoft Research, US) and Cormac Herley (Microsoft Research, US)
  3. Can "Something You Know" be Saved?, Baris Coskun (Polytechnic University, US) and Cormac Herley (Microsoft Research, US)
15:35-16:00Coffee Break
Session 10: Security Protocols
Session Chair: Prof. Willy Susilo, University of Wollongong, Australia
  1. New Communication-Efficient Oblivious Transfer Protocols Based on Pairings, Helger Lipmaa (Cybernetica AS, EE)
  2. A New (k,n)-Threshold Secret Sharing Scheme and Its Extension, Jun Kurihara (KDDI R&D Laboratories, Inc., JP), Shinsaku Kiyomoto (KDDI R&D Laboratories, Inc., JP), Kazuhide Fukushima (KDDI R&D Laboratories, Inc., JP), and Toshiaki Tanaka (KDDI R&D Laboratories, Inc., JP)
  3. Strong Accumulators from Collision-resistant Hashing, Philippe Camacho (University of Chile, CL), Alejandro Hevia (University of Chile, CL), Marcos Kiwi (Modelamiento Matemático, CL), and Roberto Opazo (CEO
  4. A Novel Audio Steganalysis Based on High Order Statistics of a Distortion Measure with Hausdorff Distance, Yali Liu (University of California, Davis, US), Ken Chiang (Sandia National Laboratories, US), Cherita Corbett (Sandia National Laboratories, US), Rennie Archibald (University of California, Davis, US), Biswanath Mukherjee (University of California, Davis, US), and Dipak Ghosal (University of California, Davis, US)

[back to Top ^^^]